Robust Header Compression Processing Method and Robust Header Compression Processor

a header compression and processing method technology, applied in the field of mobile communication, can solve the problems of wasting wireless resources, wasting wireless resources, and reducing so as to improve the efficiency of compression and decompression, robust header compression, and the utilization rate of wireless link bandwidth

Active Publication Date: 2014-07-17
ZTE CORP
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0058]With the above robust header compression processing method and robust header compressor, firstly the IP identifier behavior pattern is determined according to the plurality of data packets at the front, and then compression processing is performed on the data packets according to the determined IP identifier behavior pattern, thus, appropriate compression strategies can be effectively adopted by identifying the behaviors of the IPID, which improves the efficiency of compression and decompression of robust header compression and the utilization rate of wireless link bandwidth.

Problems solved by technology

Due to the limitation of physical conditions, when compared with wired links, wireless links in a mobile communication system have a lower transmission rate and a higher bit error rate.
With the increase of ROHC application scenarios and the progressive development of the protocols, this assumption is obviously out of date.
When the specific behaviors of the IPID are not known, it can be only believed that the behaviors of the IPID are random, so only the original IPID value can be sent each time, thereby wasting wireless resources and reducing the efficiency of compression and decompression.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Robust Header Compression Processing Method and Robust Header Compression Processor
  • Robust Header Compression Processing Method and Robust Header Compression Processor
  • Robust Header Compression Processing Method and Robust Header Compression Processor

Examples

Experimental program
Comparison scheme
Effect test

embodiment 1

[0068]As shown in FIG. 2, the robust header compression processing method in the embodiment 1 of the present document includes the following steps.

[0069]In step 201, a compressor processes a plurality of data packets at the front of a packet flow by using an IP identifier random behavior pattern, and determines an IP identifier behavior pattern according to characteristics of IP identifiers in the plurality of data packets at the front.

[0070]The step of determining an IP identifier behavior pattern according to characteristics of IP identifiers in the plurality of data packets at the front includes:

[0071]if a first condition that the IP identifiers in the data packets increase continuously and a number of data packets with continuously increasing times reaches a first threshold value is satisfied, determining as an IP identifier incremental behavior pattern;

[0072]if a second condition that the IP identifiers in the data packets keep static continuously and a number of data packets k...

embodiment 2

[0080]In the scheme, identification of a specific behavior of the IPID is implemented by setting an identifier and accumulating three counters.

[0081]An implementation scheme of IP identifier behavior identification and IP identifier compression involved in the present document will be further described in detail in combination with FIG. 3 and FIG. 4 below, and the followings steps are included.

[0082]In step S301, a compressor receives a packet data package to be compressed, and it is to proceed to step S302.

[0083]In step S302, it is judged whether the packet flow has already existed, if the packet flow does not exist, it is to proceed to step S303, and if the packet flow exists, it is to proceed to step S306.

[0084]In step S303, an IP identifier behavior flag (BehaviorFlag) and three counters, an IP identifier random behavior counter IP rnd, an IP identifier static behavior counter Count_const and an IP identifier sequential behavior counter Count_seq, are initialized, and it is to p...

embodiment 3

[0123]In this scheme, identification of a specific behavior of the IPID is implemented by setting an identifier and accumulating two counters. Compared with the foregoing embodiment 2, in the embodiment 3, the flows corresponding to FIG. 3 are basically the same, the difference only lies in the step S303, only the Behavior Flag and the 2 counters, Count_const and Count_Seq, are initialized, and the step S304 is not executed, the process of selecting IP identifier behaviors is executed, and as shown in FIG. 5, the following steps are specifically included:

[0124]In step S501, when a compressor receives a packet package to be compressed and the packet flow has existed, it is to proceed to step S502.

[0125]In step S502, it is judged whether a Behavior Flag is 0, if the Behavior Flag is not 0, it is to proceed to step S503, and if the Behavior Flag is 0, it is to proceed to step S504.

[0126]In step S503, a behavior of the IPID identified by the Behavior Flag is recorded into an IpidBehacio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A robust header compression processing method and a robust header compressor are disclosed. The method includes: a compressor processing a plurality of data packets at the front of a packet flow by using an Internet Protocol (IP) identifier random behavior pattern, and determining an IP identifier behavior pattern according to characteristics of IP identifiers in the plurality of data packets at the front; and the compressor processing subsequent data packets of the packet flow according to the determined IP identifier behavior pattern. With the robust header compression processing method and the robust header compressor, waste of wireless resources can be avoided, and a utilization rate of the wireless resources can be enhanced.

Description

TECHNICAL FIELD [0001]The present document relates to the field of mobile communication, and especially, to a robust header compression processing method and a robust header compression algorithm in a robust header compression processor.BACKGROUND OF THE RELATED ART [0002]Due to the limitation of physical conditions, when compared with wired links, wireless links in a mobile communication system have a lower transmission rate and a higher bit error rate. In order to make effective use of the limited wireless channel bandwidth resources, the Robust Header Compress (ROHC) technology is introduced. The core of ROHC is to use the information redundancy between packets of service flow to transparently compress and decompress information in packet headers between directly connected nodes. The ROHC technology is described by the RHC3095 document of Internet Engineering Task Force (IETF). But compression and decompression of an Internet Protocol (IP) header is not defined in the document, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L69/22H04L69/04H04L69/16H04W28/06
Inventor SHI, XUEHONG
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products